Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smoothing methods
biblio
Analysis of Intrusion Detection Performance by Smoothing Factor of Gaussian NB Model Using Modified NSL-KDD Dataset
Submitted by grigby1 on Fri, 01/13/2023 - 12:51pm
Shape
zero-day detection
smoothing
Gaussian NB
smoothing methods
Security by Default
NSL-KDD
network intrusion detection
gaussian distribution
Support vector machines
Intrusion Detection
Scalability
Analytical models
Radio frequency
Resiliency
resilience
pubcrawl
biblio
Fast-variable Processes Analysis Using Classical and Approximation Spectral Analysis Methods
Submitted by grigby1 on Fri, 09/09/2022 - 2:23pm
Fourier transform
frequency characteristics
fast-variable processes
classical spectral analysis
approximation
damping
smoothing methods
frequency estimation
Resiliency
Time Frequency Analysis
security
Time-frequency Analysis
Time series analysis
resilience
estimation
Scalability
Analytical models
Metrics
pubcrawl
time series
biblio
Semi-Supervised False Data Detection Using Gated Recurrent Units and Threshold Scoring Algorithm
Submitted by grigby1 on Tue, 07/05/2022 - 11:22am
composability
Super-vised/Unsupervised Learning Detection Method
Power system measurements
Gated Recurrent Unit (GRU)
deep learning algorithm
Attack Templates
smoothing methods
false data injection attack
supervised learning
False Data Detection
Logic gates
Resiliency
resilience
Human behavior
pubcrawl
cyber security
machine learning algorithms
Training
deep learning
biblio
SVAD: End-to-End Sensory Data Analysis for IoBT-Driven Platforms
Submitted by grigby1 on Thu, 06/09/2022 - 2:31pm
machine learning algorithms
pubcrawl
resilience
Resiliency
Scalability
real-time systems
data analysis
Data visualization
Pipelines
iobt
Anomaly
Sensor phenomena and characterization
smoothing methods
Human Factors
unsupervised machine learning
biblio
Infrared and Visible Image Fusion Based on Multiscale Decomposition with Gaussian and Co-Occurrence Filters
Submitted by grigby1 on Fri, 04/22/2022 - 1:15pm
Artificial Intelligence
co-occurrence filter
composability
Compositionality
decomposition
filtering algorithms
Image edge detection
image fusion
Indexes
Information filters
infrared and visible light
Metrics
Pattern recognition
pubcrawl
smoothing methods
biblio
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding
Submitted by aekwall on Fri, 02/25/2022 - 10:47am
Watermarking
Robustness
Training
data privacy
pubcrawl
Metrics
Resiliency
Human behavior
composability
Semantics
Provenance
Natural languages
smoothing methods
biblio
Detecting Cyber-Attacks in Modern Power Systems Using an Unsupervised Monitoring Technique
Submitted by aekwall on Tue, 02/22/2022 - 2:17pm
Measurement and Metrics Testing
sustainable development
statistical monitoring charts
smoothing methods
power transmission
modern power system
kNN algorithm
Time-frequency Analysis
cyber-attacks
Training data
Metrics
pubcrawl
Medical services
Intrusion Detection
Measurement
biblio
SAM: The Sensitivity of Attribution Methods to Hyperparameters
Submitted by aekwall on Thu, 05/13/2021 - 11:49am
Human behavior
pubcrawl
composability
Metrics
Robustness
attribution
Noise measurement
Sensitivity
Heating systems
smoothing methods
Limiting
biblio
Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
IoT environment
topological isolation
smoothing methods
low power and lossy network
IPv6 routing protocol over LLN
IPv6 over low power personal area network
Internet of things environment
high performance computing environment
forecasting
exponential window function
exponential smoothing time series data
exponential smoothing
blackhole attack detection approach
Blackhole attack
personal area networks
time series
IoT
blackhole attacks
telecommunication network topology
sensors
RFID
sink node
6LoWPAN
internet
Routing
Routing protocols
pubcrawl
Resiliency
Internet of Things
Scalability
IP networks
RPL
biblio
New Steganography Scheme to Conceal a Large Amount of Secret Messages Using an Improved-AMBTC Algorithm Based on Hybrid Adaptive Neural Networks
Submitted by grigby1 on Tue, 05/01/2018 - 11:34am
image steganography scheme
steganography detection
Steganography
standards
smoothing methods
secret message concealing
PVD systems
pubcrawl
privacy
Neural networks
neural nets
Metrics
media file
improved-AMBTC algorithm
improved absolute moment block truncation coding algorithm
adaptive systems
Image Steganography
Image edge detection
image concealing
image compression methods
Image coding
I-AMBTC
hybrid adaptive neural networks
HVS
edge detection operators
data compression
composability
ART
ANNS
1
2
next ›
last »